Interfocus Blog

The Blessing and Curse of Workforce Mobility

Increased productivity means increased security risk For better or for worse, we take our computing devices everywhere. From the beach to the boardroom, we use our laptops to take notes, do research, watch cat videos, and stay in touch with our networks of friends and...
Monitoring Healthcare Endpoints and Users Is Your Best Remedy for Your Security Program

Monitoring Healthcare Endpoints and Users Is Your Best Remedy for Your Security Program

In the recent US midterm elections, healthcare was a key factor for voters. Americans are clearly worried about healthcare coverage and the increasing costs of taking care of themselves and their families. Yet, with all the debates on ... Read More

Case Study: Manufacturer Increases Security and Compliance with Interfocus

Case Study: Manufacturer Increases Security and Compliance with Interfocus

Selecting a stable and comprehensive security solution took on additional importance when a manufacturing company was asked to comply with its partner’s security policy. Read More

Case Study: Defense Client Ensures Regulatory Compliance with Interfocus

Case Study: Defense Client Ensures Regulatory Compliance with Interfocus

A defense manufacturer that controls the export and import of defense-related articles and service found themselves struggling to maintain the balance between productivity and security. Read More

Today’s Technology Tip: Clean Out Your Downloads Folder

Today’s Technology Tip: Clean Out Your Downloads Folder

How often do you clean out your Downloads folder? I suggest that you regularly delete the files you no longer use to get rid of DLL Preloading attack. Read More

A New Key to Security

A New Key to Security

Headlines about security breaches are everywhere. Some security professionals suggest having multi-factor authentication (MFA) technologies for all users. Read More

Client Prevents Threats by Combining Interfocus and CylancePROTECT

Client Prevents Threats by Combining Interfocus and CylancePROTECT

The financial services industry is constantly under attack. Some firms estimate more than a million new pieces of malware are being generated every day. Read More

Today’s Technology Tip: Watch Those File Extensions!

Today’s Technology Tip: Watch Those File Extensions!

Simple but highly recommended method to unmask malware executables masquerading as other file types Read More

Your User’s Digital Footprints: The Key to Recovering from Attacks

Your User’s Digital Footprints: The Key to Recovering from Attacks

Like human fingerprints, your employees’ network activity leave behind digital footprints, or a unique set of tracks that identify who did what, where and when.  A user’s digital footprint is an asset to your organization, helping you identify ... Read More

Today’s Technology Tip: Backup for Security

Today’s Technology Tip: Backup for Security

We are pleased to introduce a new component to our blog, wherein Masa Hashiguchi, Interfocus’ Lead Solutions Engineer, shares best practices for IT security, derived from the network infrastructure and IT operations across our 10,000 clients around the world. Do you have a backup strategy for 2017? If not, you should. Incorporating backup strategies into your daily routine strengthens your defense against ransomware and other data accidents. Read More